US7856657B2 - Secure access of resources at shared appliances - Google Patents

Secure access of resources at shared appliances Download PDF

Info

Publication number
US7856657B2
US7856657B2 US11/589,520 US58952006A US7856657B2 US 7856657 B2 US7856657 B2 US 7856657B2 US 58952006 A US58952006 A US 58952006A US 7856657 B2 US7856657 B2 US 7856657B2
Authority
US
United States
Prior art keywords
shared
user
resource
identifier
appliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/589,520
Other versions
US20080148049A1 (en
Inventor
Keith E. Moore
Mohamed Dekhil
Rajesh K. Shenoy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Workday Inc
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEKHIL, MOHAMED, MOORE, KEITH E.
Priority to US11/589,520 priority Critical patent/US7856657B2/en
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHENOY, RAJESH K., DEKHIL, MOHAMED, MOORE, KEITH E.
Priority to PCT/US2007/022918 priority patent/WO2008063362A2/en
Priority to EP07867316.7A priority patent/EP2078283B1/en
Priority to JP2009535297A priority patent/JP2010508602A/en
Publication of US20080148049A1 publication Critical patent/US20080148049A1/en
Publication of US7856657B2 publication Critical patent/US7856657B2/en
Application granted granted Critical
Assigned to Workday, Inc. reassignment Workday, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HP INC., HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the shared appliances are generally used by multiple users to obtain various resources. For example, a company may have 50 printers at different locations in multiple offices.
  • a user wishes to print one of his documents, the user typically enters a print command in a computing device to print the document to a specific printer.
  • the printer is often physically distant from the user initiating the printout, there is a danger that sensitive documents will be collected by some other individual either accidentally or maliciously.
  • An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being associated with a first identifier, receiving a second identifier from a shared appliance, determining a pseudo identity associated with the shared appliance based on the second identifier, granting to the shared appliance permissions associated with the pseudo identity, including a permission to retrieve the resource from the secure repository, receiving the first identifier from a second user at the shared appliance, and enabling the shared appliance to provide the resource to the second user at the shared appliance.
  • FIG. 1 illustrates an exemplary system for providing secure access of resources at multiple shared appliances.
  • FIG. 2 illustrates an exemplary process for registering users.
  • FIG. 3 illustrates an exemplary process for registering shared appliances.
  • FIG. 4 illustrates an exemplary process for providing secure access of resources.
  • FIG. 5 illustrates an exemplary implementation for providing secure access of documents at a shared printer.
  • Section II describes an exemplary system for providing secure access of resources at multiple shared appliances.
  • Section III describes exemplary processes for providing secure access of resources at a shared appliance.
  • Section IV describes an exemplary implementation for providing secure access of documents at a printer.
  • Section V describes exemplary applications.
  • Section VI describes an exemplary computing environment.
  • FIG. 1 illustrates an exemplary system 100 for providing secure access of resources at multiple shared appliances.
  • Appliances may include, without limitation, any machine or device (domestic appliance, electrical device, etc.) able to provide resources to one or more users.
  • Types of resources may include, without limitation, hardcopy documents, softcopy files, any other form of content, etc.
  • the exemplary system 100 includes three trust regions.
  • Trust region 1 includes a server 110 logically coupled to a database 120 .
  • the database 120 may be an internal or an external database that is accessible to the server 110 .
  • the database 120 stores data and information (e.g., about users, resources, and/or other information).
  • the information may include a list of users, one or more identifiers, and/or information relating to the appliances. Exemplary processes for registering users and appliances will be described in more detail below with reference to FIGS. 2 and 3 .
  • trust region 1 is a trusted domain implemented as a Microsoft® Windows Domain or using any other identity certification system known in the art (e.g., PKI).
  • Trust region 2 includes multiple shared appliances and applications running on the appliances under pseudo identities. For ease of illustration, only three appliances are shown in FIG. 1 . In actual implementation, any number of appliances, whether or not the same type of appliance, may be included in the trust region 2 .
  • each class of appliances e.g., printers, television sets, scanners, cameras, etc.
  • each class of appliances is assigned a pseudo identity having its own identifier. For example, all the printers at the Hewlett-Packard Company may be assigned the pseudo identity of “HP printing assistant.”
  • every shared appliance having the same pseudo identity uses the same unique identification credential to become recognized in the trusted domain of trust region 1 . In FIG. 1 , the pseudo identity assigned to all three appliances is “user D.”
  • each shared appliance may include selection logic to enable it to select a pseudo identity (e.g., from a set of pseudo identities) that is known to one or more server and/or database for requesting access to any particular resource.
  • the selection logic may be based on an identifier provided by a user at a shared appliance.
  • Trust region 3 includes multiple users.
  • the users may delegate limited rights (e.g., only read rights for accessing the user's resources) to the pseudo identities in trust region 2 .
  • This information can be stored in the database 120 .
  • the server 110 may access the database 120 to determine that user D is permitted to read documents that can be provided to both user A and user B.
  • At least some of the users may be pre-registered. Registered users may provide billing information (e.g., credit card numbers) to the server 110 to enable the server to bill the users for resource retrieval at the shared appliances. Other users may use pre-paid cards (such as RFID cards) that identify accounts that are debited when retrieving documents and/or other payment methods.
  • billing information e.g., credit card numbers
  • pre-paid cards such as RFID cards
  • the three trust regions illustrated in FIG. 1 are merely exemplary. A person skilled in the art will recognize that more (or fewer) trust regions may be implemented depending on design choice, including a desired security level.
  • FIG. 2 illustrates an exemplary process for registering a user.
  • User registration is optional. Registration can be used to implement a billing mechanism to collect fees (or debit pre-paid accounts) for providing convenient resource retrieval services.
  • a user identity (e.g., name, username, and/or other login credential, etc.) is received by a server.
  • a user may name his/her own identity or an identity may be assigned by the server (e.g., user #1234).
  • user information for billing purposes is received.
  • the information may include credit card numbers, expiration date, bank routing and account numbers, and/or other payment sources.
  • the user's identity is associated with the user's billing information in a database (e.g., the database 120 ) using known mapping technology (e.g., LDAP database, etc.).
  • a database e.g., the database 120
  • known mapping technology e.g., LDAP database, etc.
  • FIG. 3 illustrates an exemplary process for registering a shared appliance.
  • a shared appliance is determined to be a member of a class of appliances.
  • each class is assigned a pre-determined pseudo identity.
  • the class that includes printers at a library may be assigned the pseudo identity of “library printing assistant.”
  • Each pseudo identity typically has an associated (or pre-assigned) level of permissions.
  • the pseudo identity may be selected from a list of pre-determined identities, determined dynamically, and/or otherwise derived based on different factors (e.g., location, device capability, company name, etc.).
  • a person skilled in the art will recognize that any known credential authentication process (e.g., Microsoft User Domain authentication or UNIX UID/passwords, etc.) can be implemented to effect the pseudo identity and role-based security of different classes of shared appliances.
  • a unique identification credential is assigned to the pseudo identity.
  • the shared appliance is registered as having the pseudo identity.
  • multiple appliances may have the same pseudo identity and can each contact the trusted domain using the same identification credential.
  • Any user may request to send a resource (e.g., request to print a document to a printer) to a secure repository accessible by the server in order to make the resource accessible by any registered shared appliance.
  • a resource e.g., request to print a document to a printer
  • Each sent resource is associated with at least one identifier or key that is known to a user who will be collecting the resource.
  • the identifier may or may not be a default identifier.
  • the identifier may be a one-time key that is communicated (e.g., out-of-band) by the first user to a second user, who is collecting the sent resource.
  • the second user then presents the identifier associated with the resource at a shared appliance to obtain that resource.
  • the appliance first identifies itself to the server 110 using its assigned identification credential for proving its pseudo identity.
  • the appliance may establish its pseudo identity prior to the current transaction with the second user. Once its pseudo identity has been proven, the appliance presents the identifier provided by the second user to the server 110 to request permission to fetch the requested resource for the second user.
  • FIG. 4 illustrates an exemplary process for securely providing resources at a shared appliance.
  • an instruction to send a resource is received from a first user by a server (e.g., server 110 ).
  • the resource is requested to be sent to a secure repository accessible by the server.
  • the requested resource is associated with a first identifier.
  • the first user may select an identifier from a pull-down menu or a directory, manually enter an identifier, or otherwise generate or obtain an identifier.
  • the first identifier may include, without limitation, one or more of the following: a badge, a fingerprint, a password, a PIN code, credit card numbers, and/or any other form of identifier or key.
  • a second identifier is received from a shared appliance.
  • the second identifier is an assigned identification credential for identifying the shared appliance as a member of a class identified by a pseudo identity. For example, if the shared appliance is a printer, it may present an assigned identification credential for identifying itself as a “printing assistant.”
  • the shared appliance may identity itself to the server (by providing the second identifier) prior to the current transaction or it may identify itself at the beginning of each transaction.
  • the identification process can be performed locally at the shared appliance or remotely (e.g., at the server or the secure repository).
  • the pseudo identity of the shared appliance is determined based on the second identifier. For example, the unique identification credential provided by the shared appliance is matched to a pre-determined pseudo identity.
  • the shared appliance may be configured to be dedicated to a single server with a pre-determined pseudo identity.
  • the shared appliance may be configured to be able to select a different server (or database) from a set of servers by providing an appropriate identifier to the selected server (i.e., an identifier of a pseudo identity known to the selected server) at the beginning of the next transaction.
  • the selection logic for determining which server to select may be based on the identifier to be presented to the shared appliance by the second user. In another implementation, the selection logic may be pre-programmed into the shared appliance.
  • permissions associated with the determined pseudo identity are granted to the shared appliance.
  • the permissions include the permission to retrieve the resource from the secure repository.
  • An example of an additional permission would be the ability to fetch an authoring document or web page and convert that document into a format appropriate to the shared device (e.g., rasterize the document).
  • the shared appliance may inform the server and/or database about the type of resource format(s) the appliance is capable of accepting.
  • the first identifier is received from a second user at the shared appliance.
  • the second user may or may not be the same entity as the first user.
  • the first identifier may be communicated by the first user to the second user.
  • the communication may be verbal (e.g., in person, via the telephone, via the cellular phone, etc.), electronic text (e.g., via a computing device over a network, etc.), written text (e.g., via a hardcopy paper, etc.), and/or through any other in-band or out-of-band communication means.
  • the second user may already know the first identifier (e.g., a shared secret, a default value, previously communicated identifier, etc.).
  • the shared appliance includes a receptacle, a keyboard, a magnetic or RF id reader, and/or other means for receiving the first identifier.
  • the shared appliance is enabled to retrieve the resource from the secure repository and provide it to the second user.
  • the resource is decoded prior to being provided to the second user.
  • the resource may have been encoded and has to be decoded before the shared appliance can render the resource useable to the second user.
  • the first identifier may also be used to decode the resource.
  • the second user may be prompted to enter (or otherwise provide unprompted) a separate key to decode the resource.
  • the decoding can be performed locally at the shared appliance or remotely (e.g., at the server, secure repository, etc.). If decoding is done remotely, the transmission of the decoded resource to the shared appliance may be encrypted using known encryption technology (e.g., SSL).
  • the resource to be provided may be marked to indicate the identity of the second user. This way, any unauthorized copying or dissemination of the resource may be traceable.
  • the resource may be marked with a watermark, variable spacing, half-tone algorithms, a barcode, and/or other marking techniques known in the art.
  • FIG. 5 illustrates an exemplary implementation for providing secure access of resources.
  • the resources to be accessed are documents and the shared appliance is a printer.
  • User 1 is not the same entity as User 2 .
  • a person skilled in the art will recognize that the example described is equally applicable if User 1 is the same entity as User 2 .
  • User 1 provides an instruction to a server (not shown) via a computing device 510 to print a document and associate that document with a first identifier (e.g., User 2 's badge number).
  • a first identifier e.g., User 2 's badge number
  • User 1 may select User 2 's email address from a pull-down menu to be associated with the document.
  • the email address then may be translated by the server to User 2 's badge number.
  • the requested document is fetched from a memory 520 and sent to a secure repository 530 .
  • User 1 communicates to User 2 using an out-of-band network (indicated by the dashed line) that the document has been sent to the secure repository 530 .
  • User 1 may also inform User 2 about the identifier needed to access the document at the printer 540 , the key needed to decode the document, and/or other information.
  • the printer 540 if not already authenticated, will first present its own identifier to identify itself to the server and/or secure repository 530 .
  • the printer 540 may present the credentials assigned to the pseudo identity of a “printing assistant.” After the printer 540 has been identified, it may be treated as a member of the trusted domain of the secure repository and uses the permissions of the pseudo identity.
  • the printer 540 then presents the first identifier provided by User 2 to request permission to fetch the requested document from the secure repository 530 . If the first identifier matches the identifier associated with the document, then the printer 540 is granted permission to fetch the document for User 2 .
  • the printer 540 fetches the document and provides it to User 2 .
  • the document may be decoded prior to being provided to User 2 (either by a key known at the shared device or by a key provided by User 2 ).
  • the first identifier may comprise two identifiers, the first being a decoding key and the second part being the identifier for identifying the desired resource.
  • the user may be prompted to select from the available resources or by default all such resources will be retrieved.
  • the secure resource access described herein may be applicable to many different scenarios. Two examples will now be described in this Section. These examples are provided for illustration purposes only. The invention should not be limited to any exemplary implementations described herein.
  • the exemplary implementation illustrated in FIG. 5 may be useful for enabling secure printing anywhere.
  • an airport may be equipped with printers.
  • the airport may have a contractual agreement with a service provider for enabling registered users of the service provider to securely print documents at any of the airport's printers.
  • all the printers at the airport may be assigned a pseudo identity of “airport printing assistant” and a unique identification credential associated with the pseudo identity.
  • any of the airport printers may request permission to fetch documents stored at a secure repository under the service provider's control to print to any registered user authorized to obtain the documents.
  • an airport printer is identified by its pseudo identify “airport printing assistant” (i.e., by presenting its unique identification credential associated with the pseudo identity), it can be treated as a member of the same trusted domain as the secure repository.
  • a registered user at the airport can enter a print command on his laptop computer, walk up to the nearest airport printer, provide an identifier which he has associated with the document, then obtain the printed document from the printer.
  • the backend authentication processes can be completely transparent to the user.
  • the exemplary system described herein may be implemented to provide secure access to pre-paid movies anywhere.
  • a hotel may have a contractual agreement with a service provider for enabling registered users of the service provider to securely view pre-paid movies at the hotel.
  • a user may have a paid cable TV subscription at his home. When the user travels, he may wish to view the movies he had already pre-paid as part of his home subscription at the hotel television set without having to pay yet another fee to the hotel.
  • the user or a family member may send the pre-paid movie to a secure repository.
  • the user When the user is ready to view the movie at the hotel, the user walks up to the television set at the hotel and presents an identifier associated with that movie.
  • the television set then identifies itself to the server or secure repository using its identifier associated with a previously assigned pseudo identity. Once identified, the television set may submit the identifier provided by the user to request permission to fetch the pre-paid movie and play the movie to the user.
  • the television set may be substituted by any other suitable appliance (e.g., a set top box, etc.).
  • the techniques described herein can be implemented using any suitable computing environment.
  • the computing environment could take the form of software-based logic instructions stored in one or more computer-readable memories and executed using a computer processor.
  • some or all of the techniques could be implemented in hardware, perhaps even eliminating the need for a separate processor, if the hardware modules contain the requisite processor functionality.
  • the hardware modules could comprise PLAs, PALs, ASICs, and still other devices for implementing logic instructions known to those skilled in the art or hereafter developed.
  • the computing environment with which the techniques can be implemented should be understood to include any circuitry, program, code, routine, object, component, data structure, and so forth, that implements the specified functionality, whether in hardware, software, or a combination thereof.
  • the software and/or hardware would typically reside on or constitute some type of non-transitory computer-readable medium which can store data and logic instructions that are accessible by the computer or the processing logic.
  • non-transitory media might include, without limitation, hard disks, floppy disks, magnetic cassettes, flash memory cards, digital video disks, removable cartridges, random access memories (RAMs), read only memories (ROMs), and/or still other non-transitory electronic, magnetic and/or optical media known to those skilled in the art or hereafter developed.

Abstract

An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being associated with a first identifier, receiving a second identifier from a shared appliance, determining a pseudo identity associated with the shared appliance based on the second identifier, granting to the shared appliance permissions associated with the pseudo identity, including a permission to retrieve the resource from the secure repository, receiving the first identifier from a second user at the shared appliance, and enabling the shared appliance to provide the resource to the second user at the shared appliance.

Description

BACKGROUND
Many companies have multiple shared appliances at different locations. The shared appliances are generally used by multiple users to obtain various resources. For example, a company may have 50 printers at different locations in multiple offices. When a user wishes to print one of his documents, the user typically enters a print command in a computing device to print the document to a specific printer. However, since the printer is often physically distant from the user initiating the printout, there is a danger that sensitive documents will be collected by some other individual either accidentally or maliciously.
To overcome this privacy concern, secure printing techniques have been created.
However, these techniques suffer from at least two potential issues: (1) handling printer jams/toner outages; and (2) exposure of credentials. In the case of paper jams or toner outages, the user arrives at the printer to discover the printer is disabled and the print job is stuck somewhere in the printing infrastructure. Since the printer is distant in time and location from the initiation and location of initiation of the print job, it is often difficult or impossible to recreate the print job for another printer. In the case of exposure of credentials, it is possible that the printer itself (particularly in an environment like a hotel or airport) cannot be trusted and entering the full user credentials would be unsafe.
Thus, a market exists for a method to provide secure access of resources at shared appliances that improves trustworthiness of each shared appliance and safeguards against access by unauthorized users.
SUMMARY
An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being associated with a first identifier, receiving a second identifier from a shared appliance, determining a pseudo identity associated with the shared appliance based on the second identifier, granting to the shared appliance permissions associated with the pseudo identity, including a permission to retrieve the resource from the secure repository, receiving the first identifier from a second user at the shared appliance, and enabling the shared appliance to provide the resource to the second user at the shared appliance.
Other embodiments and implementations are also described below.
BRIEF DESCRIPTION OF THE FIGURES
FIG. 1 illustrates an exemplary system for providing secure access of resources at multiple shared appliances.
FIG. 2 illustrates an exemplary process for registering users.
FIG. 3 illustrates an exemplary process for registering shared appliances.
FIG. 4 illustrates an exemplary process for providing secure access of resources.
FIG. 5 illustrates an exemplary implementation for providing secure access of documents at a shared printer.
DETAILED DESCRIPTION I. Overview
Exemplary processes and systems for providing secure access of resources at shared appliances are described.
Section II describes an exemplary system for providing secure access of resources at multiple shared appliances.
Section III describes exemplary processes for providing secure access of resources at a shared appliance.
Section IV describes an exemplary implementation for providing secure access of documents at a printer.
Section V describes exemplary applications.
Section VI describes an exemplary computing environment.
II. An Exemplary System for Providing Secure Access of Resources at Multiple Shared Appliances
FIG. 1 illustrates an exemplary system 100 for providing secure access of resources at multiple shared appliances. Appliances may include, without limitation, any machine or device (domestic appliance, electrical device, etc.) able to provide resources to one or more users. Types of resources may include, without limitation, hardcopy documents, softcopy files, any other form of content, etc.
The exemplary system 100 includes three trust regions. Trust region 1 includes a server 110 logically coupled to a database 120. The database 120 may be an internal or an external database that is accessible to the server 110. The database 120 stores data and information (e.g., about users, resources, and/or other information). For example, the information may include a list of users, one or more identifiers, and/or information relating to the appliances. Exemplary processes for registering users and appliances will be described in more detail below with reference to FIGS. 2 and 3. In an exemplary implementation, trust region 1 is a trusted domain implemented as a Microsoft® Windows Domain or using any other identity certification system known in the art (e.g., PKI).
Trust region 2 includes multiple shared appliances and applications running on the appliances under pseudo identities. For ease of illustration, only three appliances are shown in FIG. 1. In actual implementation, any number of appliances, whether or not the same type of appliance, may be included in the trust region 2. In an exemplary implementation, each class of appliances (e.g., printers, television sets, scanners, cameras, etc.) is assigned a pseudo identity having its own identifier. For example, all the printers at the Hewlett-Packard Company may be assigned the pseudo identity of “HP printing assistant.” In one implementation, every shared appliance having the same pseudo identity uses the same unique identification credential to become recognized in the trusted domain of trust region 1. In FIG. 1, the pseudo identity assigned to all three appliances is “user D.”
One skilled in the art will recognize that, depending on design choice or specific implementations, the server 110 and/or database 120 in trust region 1 may comprise multiple servers and/or databases in overlapping or disjoint trust regions. In the case of disjoint trust regions, each shared appliance may include selection logic to enable it to select a pseudo identity (e.g., from a set of pseudo identities) that is known to one or more server and/or database for requesting access to any particular resource. In an exemplary implementation, the selection logic may be based on an identifier provided by a user at a shared appliance.
Trust region 3 includes multiple users. The users may delegate limited rights (e.g., only read rights for accessing the user's resources) to the pseudo identities in trust region 2. This information can be stored in the database 120. For example, in trust region 1, the server 110 may access the database 120 to determine that user D is permitted to read documents that can be provided to both user A and user B.
At least some of the users may be pre-registered. Registered users may provide billing information (e.g., credit card numbers) to the server 110 to enable the server to bill the users for resource retrieval at the shared appliances. Other users may use pre-paid cards (such as RFID cards) that identify accounts that are debited when retrieving documents and/or other payment methods.
The three trust regions illustrated in FIG. 1 are merely exemplary. A person skilled in the art will recognize that more (or fewer) trust regions may be implemented depending on design choice, including a desired security level.
FIG. 2 illustrates an exemplary process for registering a user. User registration is optional. Registration can be used to implement a billing mechanism to collect fees (or debit pre-paid accounts) for providing convenient resource retrieval services.
At step 210, a user identity (e.g., name, username, and/or other login credential, etc.) is received by a server. In an exemplary implementation, a user may name his/her own identity or an identity may be assigned by the server (e.g., user #1234).
At step 220, user information for billing purposes is received. For example, the information may include credit card numbers, expiration date, bank routing and account numbers, and/or other payment sources.
At step 230, the user's identity is associated with the user's billing information in a database (e.g., the database 120) using known mapping technology (e.g., LDAP database, etc.).
FIG. 3 illustrates an exemplary process for registering a shared appliance.
At step 310, a shared appliance is determined to be a member of a class of appliances.
At step 320, each class is assigned a pre-determined pseudo identity. For example, the class that includes printers at a library may be assigned the pseudo identity of “library printing assistant.” Each pseudo identity typically has an associated (or pre-assigned) level of permissions. Depending on design choice, the pseudo identity may be selected from a list of pre-determined identities, determined dynamically, and/or otherwise derived based on different factors (e.g., location, device capability, company name, etc.). A person skilled in the art will recognize that any known credential authentication process (e.g., Microsoft User Domain authentication or UNIX UID/passwords, etc.) can be implemented to effect the pseudo identity and role-based security of different classes of shared appliances.
At step 330, a unique identification credential is assigned to the pseudo identity.
At step 340, the shared appliance is registered as having the pseudo identity. Thus, multiple appliances may have the same pseudo identity and can each contact the trusted domain using the same identification credential.
Any user may request to send a resource (e.g., request to print a document to a printer) to a secure repository accessible by the server in order to make the resource accessible by any registered shared appliance. Each sent resource is associated with at least one identifier or key that is known to a user who will be collecting the resource. The identifier may or may not be a default identifier. For example, the identifier may be a one-time key that is communicated (e.g., out-of-band) by the first user to a second user, who is collecting the sent resource. In this example, the second user then presents the identifier associated with the resource at a shared appliance to obtain that resource.
In an exemplary implementation, the appliance first identifies itself to the server 110 using its assigned identification credential for proving its pseudo identity. In another implementation, the appliance may establish its pseudo identity prior to the current transaction with the second user. Once its pseudo identity has been proven, the appliance presents the identifier provided by the second user to the server 110 to request permission to fetch the requested resource for the second user.
III. An Exemplary Process for Securely Providing Resources at a Shared Appliance
FIG. 4 illustrates an exemplary process for securely providing resources at a shared appliance.
At step 410, an instruction to send a resource is received from a first user by a server (e.g., server 110). In an exemplary implementation, the resource is requested to be sent to a secure repository accessible by the server. The requested resource is associated with a first identifier. For example, the first user may select an identifier from a pull-down menu or a directory, manually enter an identifier, or otherwise generate or obtain an identifier. The first identifier may include, without limitation, one or more of the following: a badge, a fingerprint, a password, a PIN code, credit card numbers, and/or any other form of identifier or key.
At step 420, a second identifier is received from a shared appliance. In an exemplary implementation, the second identifier is an assigned identification credential for identifying the shared appliance as a member of a class identified by a pseudo identity. For example, if the shared appliance is a printer, it may present an assigned identification credential for identifying itself as a “printing assistant.” In one implementation, the shared appliance may identity itself to the server (by providing the second identifier) prior to the current transaction or it may identify itself at the beginning of each transaction. The identification process can be performed locally at the shared appliance or remotely (e.g., at the server or the secure repository).
At step 430, the pseudo identity of the shared appliance is determined based on the second identifier. For example, the unique identification credential provided by the shared appliance is matched to a pre-determined pseudo identity. In an exemplary implementation, the shared appliance may be configured to be dedicated to a single server with a pre-determined pseudo identity. In another exemplary implementation, the shared appliance may be configured to be able to select a different server (or database) from a set of servers by providing an appropriate identifier to the selected server (i.e., an identifier of a pseudo identity known to the selected server) at the beginning of the next transaction. The selection logic for determining which server to select may be based on the identifier to be presented to the shared appliance by the second user. In another implementation, the selection logic may be pre-programmed into the shared appliance.
At step 440, permissions associated with the determined pseudo identity are granted to the shared appliance. In an exemplary implementation, the permissions include the permission to retrieve the resource from the secure repository. An example of an additional permission would be the ability to fetch an authoring document or web page and convert that document into a format appropriate to the shared device (e.g., rasterize the document). In this example, the shared appliance may inform the server and/or database about the type of resource format(s) the appliance is capable of accepting.
At step 450, the first identifier is received from a second user at the shared appliance. The second user may or may not be the same entity as the first user. In an exemplary implementation, if the first and second users are not the same entity, the first identifier may be communicated by the first user to the second user. The communication may be verbal (e.g., in person, via the telephone, via the cellular phone, etc.), electronic text (e.g., via a computing device over a network, etc.), written text (e.g., via a hardcopy paper, etc.), and/or through any other in-band or out-of-band communication means. In another exemplary implementation, the second user may already know the first identifier (e.g., a shared secret, a default value, previously communicated identifier, etc.). In an exemplary implementation, the shared appliance includes a receptacle, a keyboard, a magnetic or RF id reader, and/or other means for receiving the first identifier.
At step 460, the shared appliance is enabled to retrieve the resource from the secure repository and provide it to the second user. In an exemplary implementation, the resource is decoded prior to being provided to the second user. For example, the resource may have been encoded and has to be decoded before the shared appliance can render the resource useable to the second user. In an exemplary implementation, the first identifier may also be used to decode the resource. In another exemplary implementation, depending on the desired level of security, the second user may be prompted to enter (or otherwise provide unprompted) a separate key to decode the resource. The decoding can be performed locally at the shared appliance or remotely (e.g., at the server, secure repository, etc.). If decoding is done remotely, the transmission of the decoded resource to the shared appliance may be encrypted using known encryption technology (e.g., SSL).
In addition, in one implementation, the resource to be provided may be marked to indicate the identity of the second user. This way, any unauthorized copying or dissemination of the resource may be traceable. For example, the resource may be marked with a watermark, variable spacing, half-tone algorithms, a barcode, and/or other marking techniques known in the art.
The process described above is merely exemplary. A person skilled in the art will recognize that other process steps may be implemented to securely provide resources at a shared appliance.
IV. An Exemplary Implementation for Providing Secure Access of Resources at a Printer
FIG. 5 illustrates an exemplary implementation for providing secure access of resources. In this exemplary implementation, the resources to be accessed are documents and the shared appliance is a printer. In this example, User 1 is not the same entity as User 2. A person skilled in the art will recognize that the example described is equally applicable if User 1 is the same entity as User 2.
User 1 provides an instruction to a server (not shown) via a computing device 510 to print a document and associate that document with a first identifier (e.g., User 2's badge number). In an exemplary implementation, User 1 may select User 2's email address from a pull-down menu to be associated with the document. The email address then may be translated by the server to User 2's badge number. The requested document is fetched from a memory 520 and sent to a secure repository 530.
In an exemplary implementation, User 1 communicates to User 2 using an out-of-band network (indicated by the dashed line) that the document has been sent to the secure repository 530. User 1 may also inform User 2 about the identifier needed to access the document at the printer 540, the key needed to decode the document, and/or other information.
At a later time, User 2 walks up to the printer 540 and presents his badge number. The printer 540, if not already authenticated, will first present its own identifier to identify itself to the server and/or secure repository 530. For example, the printer 540 may present the credentials assigned to the pseudo identity of a “printing assistant.” After the printer 540 has been identified, it may be treated as a member of the trusted domain of the secure repository and uses the permissions of the pseudo identity. The printer 540 then presents the first identifier provided by User 2 to request permission to fetch the requested document from the secure repository 530. If the first identifier matches the identifier associated with the document, then the printer 540 is granted permission to fetch the document for User 2. The printer 540 fetches the document and provides it to User 2. In an exemplary implementation, the document may be decoded prior to being provided to User 2 (either by a key known at the shared device or by a key provided by User 2). One skilled in the art will appreciate that the first identifier may comprise two identifiers, the first being a decoding key and the second part being the identifier for identifying the desired resource.
In the case where multiple resources are identified by the same identifier, the user may be prompted to select from the available resources or by default all such resources will be retrieved.
The process described above is merely exemplary. A person skilled in the art will recognize that other resources can be securely accessed at other shared appliances based on the exemplary process steps.
V. Exemplary Applications
The secure resource access described herein may be applicable to many different scenarios. Two examples will now be described in this Section. These examples are provided for illustration purposes only. The invention should not be limited to any exemplary implementations described herein.
A. Securely Print Documents Anywhere
The exemplary implementation illustrated in FIG. 5 may be useful for enabling secure printing anywhere. For example, an airport may be equipped with printers. The airport may have a contractual agreement with a service provider for enabling registered users of the service provider to securely print documents at any of the airport's printers. In one implementation, all the printers at the airport may be assigned a pseudo identity of “airport printing assistant” and a unique identification credential associated with the pseudo identity. As a result, any of the airport printers may request permission to fetch documents stored at a secure repository under the service provider's control to print to any registered user authorized to obtain the documents. When an airport printer is identified by its pseudo identify “airport printing assistant” (i.e., by presenting its unique identification credential associated with the pseudo identity), it can be treated as a member of the same trusted domain as the secure repository.
In this example, a registered user at the airport can enter a print command on his laptop computer, walk up to the nearest airport printer, provide an identifier which he has associated with the document, then obtain the printed document from the printer. The backend authentication processes can be completely transparent to the user.
B. Securely View Pre-paid Movies Anywhere
The exemplary system described herein may be implemented to provide secure access to pre-paid movies anywhere. For example, a hotel may have a contractual agreement with a service provider for enabling registered users of the service provider to securely view pre-paid movies at the hotel. In this example, a user may have a paid cable TV subscription at his home. When the user travels, he may wish to view the movies he had already pre-paid as part of his home subscription at the hotel television set without having to pay yet another fee to the hotel.
In an exemplary implementation, the user or a family member may send the pre-paid movie to a secure repository. When the user is ready to view the movie at the hotel, the user walks up to the television set at the hotel and presents an identifier associated with that movie. The television set then identifies itself to the server or secure repository using its identifier associated with a previously assigned pseudo identity. Once identified, the television set may submit the identifier provided by the user to request permission to fetch the pre-paid movie and play the movie to the user. Of course, the television set may be substituted by any other suitable appliance (e.g., a set top box, etc.).
VI. An Exemplary Computing Environment
The techniques described herein can be implemented using any suitable computing environment. The computing environment could take the form of software-based logic instructions stored in one or more computer-readable memories and executed using a computer processor. Alternatively, some or all of the techniques could be implemented in hardware, perhaps even eliminating the need for a separate processor, if the hardware modules contain the requisite processor functionality. The hardware modules could comprise PLAs, PALs, ASICs, and still other devices for implementing logic instructions known to those skilled in the art or hereafter developed.
In general, then, the computing environment with which the techniques can be implemented should be understood to include any circuitry, program, code, routine, object, component, data structure, and so forth, that implements the specified functionality, whether in hardware, software, or a combination thereof. The software and/or hardware would typically reside on or constitute some type of non-transitory computer-readable medium which can store data and logic instructions that are accessible by the computer or the processing logic. Such non-transitory media might include, without limitation, hard disks, floppy disks, magnetic cassettes, flash memory cards, digital video disks, removable cartridges, random access memories (RAMs), read only memories (ROMs), and/or still other non-transitory electronic, magnetic and/or optical media known to those skilled in the art or hereafter developed.
VII. Conclusion
The foregoing examples illustrate certain exemplary embodiments from which other embodiments, variations, and modifications will be apparent to those skilled in the art. The inventions should therefore not be limited to the particular embodiments discussed above, but rather are defined by the claims. Furthermore, some of the claims may include alphanumeric identifiers to distinguish the elements and/or recite elements in a particular sequence. Such identifiers or sequence are merely provided for convenience in reading, and should not necessarily be construed as requiring or implying a particular order of steps, or a particular sequential relationship among the claim elements.

Claims (20)

1. A method, comprising:
in response to a request from a first user, storing a resource in a secure repository, said resource being associated with a first identifier;
receiving a second identifier from a shared appliance;
authenticating said shared appliance as a member of a class of appliances based on the second identifier;
in response to said authentication, granting to said shared appliance permissions associated with said class of appliances, including a permission to retrieve said resource from said secure repository;
receiving said first identifier from a second user at said shared appliance; and
in response to said first identifier, enabling said shared appliance to provide said resource to said second user at said shared appliance only if said shared appliance has been authenticated.
2. The method of claim 1, further comprising:
registering a plurality of shared appliances as members of classes of appliances.
3. The method of claim 2, wherein said registering includes:
assigning a pseudo identity to each class of shared appliances;
assigning a unique identification credential to each pseudo identity; and
providing said unique identification credential to each shared appliance that is registered as a member of said corresponding class of shared appliances, wherein said second identifier includes said unique identification credential and said authentication is based on said unique identification credential.
4. The method of claim 1, further comprising selecting a particular server of a plurality of servers to retrieve the resource from the secure repository, wherein said shared appliance is enabled to select said particular server based on said first identifier.
5. The method of claim 4, further comprising:
registering said shared appliance as a member of each of a plurality of classes of shared appliances; and
providing a plurality of unique identification credentials to said shared appliance, wherein each provided unique identification credential corresponds to a class of said plurality of classes of shared appliances of which said shared appliance is a member,
wherein said selecting of a particular server comprises selecting a particular unique identification credential of said plurality of provided unique identification credentials to provide to said particular server based on said first identifier.
6. The method of claim 1, further comprising:
registering a plurality of users.
7. The method of claim 6, wherein said registering includes:
obtaining billing information from each user.
8. The method of claim 1, wherein said first user is the same entity as the second user.
9. The method of claim 1, wherein said enabling includes decoding said resource using an identifier.
10. The method of claim 9, wherein said decoding is performed at a remote location from said shared appliance.
11. The method of claim 9, wherein said decoding is performed at said shared appliance.
12. The method of claim 1, further comprising marking said resource provided to said second user at said shared appliance to identify the second user as the recipient of the resource.
13. The method of claim 1, wherein said first user communicates the first identifier to the second user via an out-of-band network.
14. A system, comprising:
a secure repository;
a plurality of shared appliances;
a processor logically coupled to said secure repository and said shared appliances;
said processor being configured to execute instructions stored in a memory to:
send a resource to said secure repository in response to a request from a first user, said resource being associated with a first identifier;
receive a second identifier from a first shared appliance of said plurality of shared appliances;
authenticate said first shared appliance as a member of a class of appliances based on said second identifier;
grant to said first shared appliance permissions associated with said class of appliances, including a permission to retrieve said resource from said secure repository;
receive said first identifier from a second user at said first shared appliance; and
provide said resource to said second user at said first shared appliance only if said first shared appliance has been authenticated.
15. The system of claim 14, wherein said processor is further configured to execute instructions stored in a memory to:
assign a unique identification credential to each class of a plurality of classes of shared appliances;
register said first shared appliance as a member of at least one of said plurality of classes;
provide to said first shared appliance said unique identification credentials corresponding to said plurality of classes of shared appliances of which said shared appliance is a member; and
select a server of a plurality of servers to retrieve said resource by selecting a particular unique identification credential of said provided unique identification credentials to provide to said server, wherein said selection of said particular unique identification credential is based on said first identifier.
16. The system of claim 14, wherein said providing said resource includes decoding said resource using said first identifier and marking said resource provided to said second user at said first shared appliance to identify said second user as the recipient of said resource.
17. A non-transitory computer-readable medium, comprising logic instructions that, if executed, cause a processor-based device to:
associate a resource in a secure repository with a first identifier in response to a request from a first user;
receive a second identifier from a shared appliance;
authenticate said shared appliance based on said second identifier;
grant to said shared appliance permissions associated with said authentication, including a permission to retrieve said resource from said secure repository;
receive said first identifier from a second user at said shared appliance; and
enable said shared appliance to provide said resource to said second user at said shared appliance only if said shared appliance has been authenticated.
18. The non-transitory computer-readable medium of claim 17, further comprising logic instructions that, if executed, cause the processor-based device to:
assign a unique identification credential to each class of a plurality of classes of shared appliances;
register said shared appliance as a member of at least one of said plurality of classes;
provide to said shared appliance said unique identification credentials corresponding to said plurality of classes of shared appliances of which said shared appliance is a member; and
select a server of a plurality of servers to retrieve said resource by selecting a particular unique identification credential of said provided unique identification credentials to provide to said server, wherein said particular unique identification credential is selected based on said first identifier.
19. The non-transitory computer-readable medium of claim 17, further comprising logic instructions that, if executed, cause the processor-based device to:
decode said resource using said first identifier.
20. The non-transitory computer-readable medium of claim 17, further comprising logic instructions that, if executed, cause the processor-based device to:
mark said resource provided to said second user at said shared appliance to identify said second user as the recipient of said resource.
US11/589,520 2006-10-30 2006-10-30 Secure access of resources at shared appliances Active 2029-08-21 US7856657B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US11/589,520 US7856657B2 (en) 2006-10-30 2006-10-30 Secure access of resources at shared appliances
PCT/US2007/022918 WO2008063362A2 (en) 2006-10-30 2007-10-30 Secure access of resources at shared appliances
JP2009535297A JP2010508602A (en) 2006-10-30 2007-10-30 Secure access of resources on shared devices
EP07867316.7A EP2078283B1 (en) 2006-10-30 2007-10-30 Secure access of resources at shared appliances

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/589,520 US7856657B2 (en) 2006-10-30 2006-10-30 Secure access of resources at shared appliances

Publications (2)

Publication Number Publication Date
US20080148049A1 US20080148049A1 (en) 2008-06-19
US7856657B2 true US7856657B2 (en) 2010-12-21

Family

ID=39430265

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/589,520 Active 2029-08-21 US7856657B2 (en) 2006-10-30 2006-10-30 Secure access of resources at shared appliances

Country Status (4)

Country Link
US (1) US7856657B2 (en)
EP (1) EP2078283B1 (en)
JP (1) JP2010508602A (en)
WO (1) WO2008063362A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090251729A1 (en) * 2008-04-08 2009-10-08 Canon Kabushiki Kaisha Output device and its control method
US20140075551A1 (en) * 2012-09-07 2014-03-13 Samsung Electronics Co., Ltd. Method and apparatus to manage user account of device
US20140230034A1 (en) * 2013-02-14 2014-08-14 Dicentral Corporation Systems, methods, and apparatuses for sharing rights
US20150026782A1 (en) * 2013-07-22 2015-01-22 Ricoh Company, Ltd. Information processing system, apparatus, and method

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080130882A1 (en) * 2006-12-05 2008-06-05 International Business Machines Corporation Secure printing via rfid tags
US8769706B2 (en) * 2007-07-26 2014-07-01 International Business Machines Corporation System and method for user to verify a network resource address is trusted
FR2947133B1 (en) * 2009-06-18 2017-09-15 Sagem Comm METHOD FOR CONTROLLING A DECODER AND DECODER IMPLEMENTING SAID METHOD
JP5569326B2 (en) * 2010-10-14 2014-08-13 富士通株式会社 Management program, management apparatus, and management method
US9900172B2 (en) 2013-04-25 2018-02-20 Qualcomm Incorporated Coordinated resource sharing in machine-to-machine communication using a network-based group management and floor control mechanism

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202092B1 (en) * 1996-11-27 2001-03-13 Nec Corporation Print system managing the security of a printer shared on a network
US6378070B1 (en) 1998-01-09 2002-04-23 Hewlett-Packard Company Secure printing
US6385728B1 (en) * 1997-11-26 2002-05-07 International Business Machines Corporation System, method, and program for providing will-call certificates for guaranteeing authorization for a printer to retrieve a file directly from a file server upon request from a client in a network computer system environment
US6678828B1 (en) 2002-07-22 2004-01-13 Vormetric, Inc. Secure network file access control system
US6711677B1 (en) 1999-07-12 2004-03-23 Hewlett-Packard Development Company, L.P. Secure printing method
US6889252B2 (en) 2001-10-22 2005-05-03 Jetcaps International Business Strategy Sas Method and system for using a selected peripheral of a network using a server as a re-router
US6931530B2 (en) 2002-07-22 2005-08-16 Vormetric, Inc. Secure network file access controller implementing access control and auditing
US6952780B2 (en) * 2000-01-28 2005-10-04 Safecom A/S System and method for ensuring secure transfer of a document from a client of a network to a printer
US20050240773A1 (en) 2004-04-21 2005-10-27 Fuji Xerox Co., Ltd. Secure file sharing
US7119916B2 (en) * 2001-03-28 2006-10-10 Minolta Co., Ltd. Printing system, image forming apparatus and print management program
US7304757B2 (en) * 2001-12-21 2007-12-04 Hewlett-Packard Development Company, L.P. System and method for secure printing
US7359076B2 (en) * 2003-04-01 2008-04-15 Seiko Epson Corporation Document sharing service for network printing
US7409452B2 (en) * 2003-02-28 2008-08-05 Xerox Corporation Method and apparatus for controlling document service requests from a mobile device
US7620177B2 (en) * 2005-10-31 2009-11-17 Hewlett-Packard Development Company, L.P. Secure printing

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5143235A (en) * 1990-08-15 1992-09-01 Cap Snap Co. Bottle neck having means to prevent compression of cap skirt
US6105802A (en) * 1998-06-22 2000-08-22 Clayton Corporation Push-on closure container assembly
JP3802451B2 (en) * 2002-03-19 2006-07-26 株式会社リコー Image forming apparatus, stored document output method, and stored document output system
US7367060B2 (en) * 2002-12-11 2008-04-29 Ravi Someshwar Methods and apparatus for secure document printing

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202092B1 (en) * 1996-11-27 2001-03-13 Nec Corporation Print system managing the security of a printer shared on a network
US6385728B1 (en) * 1997-11-26 2002-05-07 International Business Machines Corporation System, method, and program for providing will-call certificates for guaranteeing authorization for a printer to retrieve a file directly from a file server upon request from a client in a network computer system environment
US6378070B1 (en) 1998-01-09 2002-04-23 Hewlett-Packard Company Secure printing
US6711677B1 (en) 1999-07-12 2004-03-23 Hewlett-Packard Development Company, L.P. Secure printing method
US6952780B2 (en) * 2000-01-28 2005-10-04 Safecom A/S System and method for ensuring secure transfer of a document from a client of a network to a printer
US7119916B2 (en) * 2001-03-28 2006-10-10 Minolta Co., Ltd. Printing system, image forming apparatus and print management program
US6889252B2 (en) 2001-10-22 2005-05-03 Jetcaps International Business Strategy Sas Method and system for using a selected peripheral of a network using a server as a re-router
US7304757B2 (en) * 2001-12-21 2007-12-04 Hewlett-Packard Development Company, L.P. System and method for secure printing
US6678828B1 (en) 2002-07-22 2004-01-13 Vormetric, Inc. Secure network file access control system
US6931530B2 (en) 2002-07-22 2005-08-16 Vormetric, Inc. Secure network file access controller implementing access control and auditing
US7409452B2 (en) * 2003-02-28 2008-08-05 Xerox Corporation Method and apparatus for controlling document service requests from a mobile device
US7359076B2 (en) * 2003-04-01 2008-04-15 Seiko Epson Corporation Document sharing service for network printing
US20050240773A1 (en) 2004-04-21 2005-10-27 Fuji Xerox Co., Ltd. Secure file sharing
US7620177B2 (en) * 2005-10-31 2009-11-17 Hewlett-Packard Development Company, L.P. Secure printing

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090251729A1 (en) * 2008-04-08 2009-10-08 Canon Kabushiki Kaisha Output device and its control method
US8310711B2 (en) * 2008-04-08 2012-11-13 Canon Kabushiki Kaisha Output device and its control method for managing and reusing a job history
US20140075551A1 (en) * 2012-09-07 2014-03-13 Samsung Electronics Co., Ltd. Method and apparatus to manage user account of device
US9529982B2 (en) * 2012-09-07 2016-12-27 Samsung Electronics Co., Ltd. Method and apparatus to manage user account of device
US20140230034A1 (en) * 2013-02-14 2014-08-14 Dicentral Corporation Systems, methods, and apparatuses for sharing rights
US9369451B2 (en) * 2013-02-14 2016-06-14 Dicentral Corporation Systems, methods, and apparatuses for sharing rights
US20150026782A1 (en) * 2013-07-22 2015-01-22 Ricoh Company, Ltd. Information processing system, apparatus, and method
US9621529B2 (en) * 2013-07-22 2017-04-11 Ricoh Company, Ltd. Information processing system, apparatus, and method

Also Published As

Publication number Publication date
EP2078283B1 (en) 2016-05-25
JP2010508602A (en) 2010-03-18
WO2008063362A2 (en) 2008-05-29
US20080148049A1 (en) 2008-06-19
EP2078283A2 (en) 2009-07-15
WO2008063362A3 (en) 2008-07-17
EP2078283A4 (en) 2013-05-29

Similar Documents

Publication Publication Date Title
US7856657B2 (en) Secure access of resources at shared appliances
CN111639956B (en) Method and device for providing and acquiring safety identity information
CN109598663B (en) Method and device for providing and acquiring safety identity information
RU2475840C2 (en) Providing digital credentials
US9306923B2 (en) Image forming apparatus, method for controlling image forming apparatus, and storage medium therefor
TWI438642B (en) Provisioning of digital identity representations
CN102609635B (en) Information processing apparatus and control method
US7774611B2 (en) Enforcing file authorization access
US8705072B2 (en) Server system and control method thereof, and computer-readable medium
CN109960900B (en) Registration code generation method and system
US20140230023A1 (en) Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
US20100192211A1 (en) Revocable Object Access
US20100124355A1 (en) Information processing device, information processing method, and computer readable medium
US20140359746A1 (en) Authentication system, authentication server, authentication method, and authentication program
JP2022144003A (en) Information processing deice and information processing program
US8219804B2 (en) Approach for managing device usage data
KR101318154B1 (en) Method of providing image-based user authentication for shared documents, and computer-readable recording medium for the same
JP2006215795A (en) Server device, control method, and program
JP2005149341A (en) Authentication method and apparatus, service providing method and apparatus, information input apparatus, management apparatus, authentication guarantee apparatus, and program
JP2008301480A (en) Cac (common access card) security and document security enhancement
JP2008199618A (en) Method, system, and computer program for using personal communication device to obtain additional information
JP2004362189A (en) User information circulation system
US9858016B2 (en) Providing device functionality utilizing authorization tokens
CN111740940A (en) Information processing system
JP2007280272A (en) Print out system of electronic file and method thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOORE, KEITH E.;DEKHIL, MOHAMED;REEL/FRAME:018476/0756

Effective date: 20061030

AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOORE, KEITH E.;DEKHIL, MOHAMED;SHENOY, RAJESH K.;REEL/FRAME:018822/0207;SIGNING DATES FROM 20061030 TO 20061207

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOORE, KEITH E.;DEKHIL, MOHAMED;SHENOY, RAJESH K.;SIGNING DATES FROM 20061030 TO 20061207;REEL/FRAME:018822/0207

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: WORKDAY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;HP INC.;SIGNING DATES FROM 20230217 TO 20230223;REEL/FRAME:063400/0810